Главная
Study mode:
on
1
Introduction
2
Authentication
3
Software Supply Chain
4
Shift Left
5
Foundational Controls
6
Transparency
7
Up the Stack
8
Sigstor
9
SCV
10
Source code
11
Microsoft initiatives
12
Inventory of hardware
13
Software Bill of Materials
14
Sigsto
15
Automation and assurance
Description:
Explore how vendors are simplifying security integration in their products through this 90-minute webcast featuring experts from Dell Technologies, Red Hat, Cisco, and Microsoft. Gain actionable insights on improving architectures and automation to address the security professional deficit, benefiting State, Local, Tribal, and Territorial networks as well as SMBs. Learn about building security into systems, automating assessments, and implementing foundational control frameworks without additional resources. Discover topics such as authentication, software supply chain, shift left methodologies, transparency, Sigstore, SCV, source code security, hardware inventory, Software Bill of Materials, and automation techniques for enhanced security assurance.

Making Security Simpler

RSA Conference
Add to list
0:00 / 0:00